Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Security Blog
Showing posts tagged with endpoint security
Showing posts in English
Suzanne Konvicka | 29 Sep 2014 | 1 comment

costofdatabreach.pngIf it seems as if every week there is another story in the news about a data breach, you aren’t mistaken. Around the world, companies are experiencing an unprecedented number of data breaches and cyber-attacks. According to Symantec’s Internet Security Threat Report, the total number of breaches in 2013 increased by 62 percent compared to 2012 with 253 total breaches, at least eight of which exposed more than 10 million identities. In total, over 552 million identities were breached...

khaley | 22 Jan 2014
SEP12-v3.jpegA cash register was part of the Internet of Things long before there was an Internet of Things.  
 
A cash register, or Point Of Sale (POS) system, is a device that contains an operating system and network connectivity. It performs a very specific task, sending data back to a central server. Put that way, it sounds very much like part of the Internet of Things (IoT).
 
The big difference between POS and “IoT” is that devices in the “new” Internet of Things tend to run some flavor of Linux, while many cash registers run some version of the Windows operating system. As such, these cash registers are susceptible to the millions of pieces of  malware written for Windows.  
...
dschrader | 28 Dec 2010 | 0 comments

Gartner just released their annual report on endpoint security (see: Magic Quadrant for Endpoint Protection Platforms, Gartner, 2010)

As you can read in the report, Symantec extended its lead both in terms of vision and ability to execute.  What is really notable, however, is the strong statement Gartner made about the future of endpoint security.  The reports starts with an indictment, "Malware effectiveness continues to accelerate, while vendors are busy polishing increasingly ineffective solutions and doing little to fundamentally reduce the attack surface and protect users."

Gartner goes on to state, "Signature-based malware detection has been limping along on life support for...